2017 21st Asia Pacific Symposium on Intelligent and Evolutionary Systems (IES) 2017
DOI: 10.1109/iesys.2017.8233569
|View full text |Cite
|
Sign up to set email alerts
|

NLP-based approaches for malware classification from API sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The N-gram TF-IDF feature model has been used in cyber security applications such as software vulnerability assessments [47], [48] and cyber threat detection [49], [50], [51], [52]. The authors of [47] used TF-IDF features extracted from bug reports to develop a tool for identifying software bugs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The N-gram TF-IDF feature model has been used in cyber security applications such as software vulnerability assessments [47], [48] and cyber threat detection [49], [50], [51], [52]. The authors of [47] used TF-IDF features extracted from bug reports to develop a tool for identifying software bugs.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [49] extracted TF-IDF features from process logs to build an intrusion detection system for a computer network. The research presented in [50] used TF-IDF features extracted from opcode sequences to classify ransomware families. The authors of [51] and [52] used TF-IDF features extracted from Application Programming Interface (API) call sequences for malware classification.…”
Section: Related Workmentioning
confidence: 99%
“…Their method extracts the features from the DLL Import name, assembly code, and hex dump. A similar approach is classifying malware from API sequences with TF-IDF and Paragraph Vector [51]. This method requires dynamic analysis to extract API sequences.…”
Section: Nlp-based Detectionmentioning
confidence: 99%
“…Taejin et al [27] transformed API calls into some code arrangements and grouped the APIs using n-gram. Tran et al [28] used natural language processing to analyze the API call sequence. They divided the long sequence calls into small chunks using approaches like n-gram.…”
Section: Related Workmentioning
confidence: 99%